A computer has an operating system with a graphical user interface. This computer also has a key manager for graphically associating objects, such as data or application programs, with keystrokes, such as Fn-Fx key combinations, where Fn is a special shift key and Fx is a numbered function key. A key group or folder contains icons which represent objects. This key group can be built or modified by the user by copying an icon contained in another program group or folder via a drag and drop or similar operation. The key manager interrogates the operating system for the contents of the key group, and receives a key array. The key array contains objects associated with keystrokes. The key manager then monitors the operating system for any keystrokes received from the user. Upon receipt of a keystroke, the key manager determines whether the keystroke is in the key group. If so, the key manager intercepts the keystroke from the operating system, and retrieves the object associated with the keystroke from the key array. If the object is not already executing, the key manager executes the object.

Patent
   5525978
Priority
Feb 28 1994
Filed
Feb 28 1994
Issued
Jun 11 1996
Expiry
Feb 28 2014
Assg.orig
Entity
Large
26
3
all paid
1. A method of graphically associating a plurality of objects with a plurality of keystrokes in a computer, said computer having an operating system with a graphical user interface, said method comprising the steps of:
copying a first icon representing a first object into a key group;
adding said first object to a first position of a key array for said key group;
automatically associating a first keystroke with said first position of said key array having said first object, said first keystroke being within a predetermined ranged of keystrokes;
copying a second icon representing a second object into said key group;
adding said second object to a second position of said key array for said key group:
automatically associating a second keystroke with said second position of said key array having said second object, said second keystroke being within said predetermined range of keystrokes;
monitoring for keystrokes received from a user;
upon receipt of a keystroke, determining whether said keystroke is within said predetermined range of keystrokes;
if said keystroke is within said predetermined range of keystrokes, retrieving the object associated with said keystroke from said key array; and
executing said object associated with said keystroke.
3. A key manager for graphically associating a plurality of objects with a plurality of keystrokes in a computer, said computer having an operating system with a graphical user interface, said graphical user interface having a key group, said key manager comprising:
means for copying a first icon representing a first object into said key group;
means for adding said first object to a first position of a key array for said key group:
means for automatically associating a first keystroke with said first position of said key array having said first object, said first keystroke being within a predetermined range of keystrokes;
means for copying a second icon representing a second object into said key group;
means for adding said second object to a second position of said key array for said key group;
means for automatically associating a second keystroke with said second position of said key array having said second object, said second keystroke being within said predetermined range of keystrokes;
means for monitoring for keystrokes received from a user;
upon receipt of a keystroke, means for determining whether said keystroke is in said predetermined range of keystrokes;
if said keystroke is in said predetermined range of keystrokes, means for retrieving the object associated with said keystroke from said key array; and
means for executing said object associated with said keystroke.
2. The method of claim 1, wherein said executing step is responsive to the step of verifying that said object has not already been executed.
4. The key manager of claim 3, wherein said operating system is a Windows operating system.
5. The key manager of claim 4, wherein said key array further comprises a command line containing a path and filename necessary to execute or invoke said object.
6. The key manager of claim 5, wherein said keystroke is a Fn-Fx keystroke, where Fn is a special shift key and Fx is a numbered function key.
7. The key manager of claim 3, wherein said key group is a folder.
8. The key manager of claim 7, wherein said operating system is a UNIX-based operating system.
9. The key manager of claim 8, wherein said keystroke is a Fn-Fx keystroke, where Fn is a special shift key and Fx is a numbered function key.
10. The key manager of claim 7, wherein said operating system is an Apple-based operating system.
11. The key manager of claim 10, wherein said keystroke is a Fn-Fx keystroke, where Fn is a special shift key and Fx is a numbered function key.

This invention relates to the electronics circuitry field. More particularly, this invention is a graphical key manager for a computer.

A computer normally has a set of function keys(e.g. F1-F12, PF1--PF10, etc). The function these keys perform, either when pressed alone or in combination with a Shift, Ctrl, Alt, Command, or similar key, are available to be defined by the application currently running on the computer. For example, the PC application PC-File 7 defines the "F1" key to be context sensitive help, while the "ALT-F1" key combination is defined to be general help. Since these key definitions are normally under the control of the application and transparent to the user, they work well and pose little difficulty. However, these keys are only useful once the application is running.

Some computers, such as the Omnibook family of computers sold by Hewlett-Packard, include a special shift key called a "Fn" key. This key, when pressed in combination with a function key, allows for quick access to applications. This key combination makes it easy to execute and switch between multiple applications, and is particularly useful when an operating system with a graphical user interface, such as Microsoft Windows, is used.

The Omnibook 300 computer comes pre-installed with specific application programs, such as Microsoft Word for Windows and Microsoft Excel, and preassigns the key combinations discussed above to allow quick access to these applications. Since the Omnibook 300 computer preinstalled all application programs a user was likely to want, no support was provided to allow users an easy way to modify these preassigned key combinations. While it would be possible for a user to modify these preassigned key combinations by editing an internal Windows file, this task requires considerable skill and knowledge about the inner workings of the operating system. Even for experienced users who knew what this file was called and where it could be found, editing it could prove to be a daunting, painful, error prone task. Unless this file is edited correctly, one or possibly all key combinations could be rendered useless, or, when pressed, could even cause the computer to cease to operate. While this problem is present on computers with preassigned but modifiable function key combinations, it is especially acute on computers with no preassigned function key combinations, where users are expected to do this dangerous assignment themselves.

A computer has an operating system with a graphical user interface. This computer also has a key manager for graphically associating objects, such as data or application programs, with keystrokes, such as Fn-Fx key combinations, where Fn is a special shift key and Fx is a numbered function key. A key group or folder contains icons which represent objects. This key group can be built or modified by the user by copying an icon contained in another program group or folder via a drag and drop or similar operation. The key manager interrogates the operating system for the contents of the key group, and receives a key array. The key array contains objects associated with keystrokes. The key manager then monitors the operating system for any keystrokes received from the user. Upon receipt of a keystroke, the key manager determines whether the keystroke is in the key group. If so, the key manager intercepts the keystroke from the operating system, and retrieves the object associated with the keystroke from the key array. If the object is not already executing, the key manager executes the object.

FIG. 1 shows a computer of the preferred embodiment of the invention.

FIG. 2 shows a portion of the computer of the preferred embodiment of the invention in more detail.

FIG. 3 shows a block diagram of the computer of the preferred embodiment of the invention.

FIG. 4 shows a flowchart of the initialization of the key manager of the preferred embodiment of the invention.

FIG. 5 shows a flowchart of the operation of the key manager of the preferred embodiment of the invention.

FIG. 6 shows an exemplary screen group of the preferred embodiment of the invention.

FIG. 7 shows the key array corresponding to the exemplary screen group of FIG. 6.

FIG. 1 shows a computer of the preferred embodiment of the invention. Computer 10 has display 15 and keyboard 20. For purposes of this invention, computer 10 could be any computer with a display and a keyboard, provided the computer is suitably programmed to practice the invention as described herein.

FIG. 2 shows a portion of the computer of the preferred embodiment of the invention in more detail. Keyboard 20 contains Fn key 21 and function keys 25-1 to 25-12. When Fn key 21 is activated, usually by being pressed and held (like a shift key) while one function key is pressed and released, quick access to a particular application is provided to the user. For the purposes of this invention, the act of pressing any single key (such as a function key) or a key sequence (such as a Shift, Alt, Ctrl, Command or Fn key in addition to a function key) shall be referred to herein as a keystroke, although those skilled in the art will appreciate that a single keystroke may actually contain multiple scan codes sent to the computer from the keyboard. Label area 28 allows users to identify the application associated with each function key sequence by affixing a label containing the name, icon, or other identifying indicia of the application program.

FIG. 3 shows a block diagram of the computer of the preferred embodiment of the invention. Computer 10 contains processor 30 connected to storage 40, memory 50, keyboard interface 60, and display interface 70. In the preferred embodiment, processor 30 is a 486SLC/e processor, although an Intel 80486 or other processor could also be used.

When computer 10 is running, operating system 80 and key manager 100 are executed by processor 30. While this is shown pictorially in FIG. 3 as being a part of processor 30, those skilled in the art will appreciate that operating system 80 and key manager 100 are actually stored in storage 40, with portions copied into memory 50 and processor 30 as needed. In the preferred embodiment, operating system 80 is the Windows 3.1 Operating System by Microsoft, although other operating systems, such as a UNIX-based or an Apple-based operating system, could also be used. Processor 30 is suitably programmed to execute the flowcharts of FIGS. 4 and 5 to initialize and execute key manager 100.

FIG. 4 shows a flowchart of the initialization of the key manager of the preferred embodiment of the invention. Block 110 starts the operating system. In the preferred embodiment, this is done by placing a line in the AUTOEXEC.BAT file to start Windows upon system reboot, although this step could be performed manually under user direction by typing WIN at the C: prompt. Block 120 installs the key manager device driver. The function performed by the key manager device driver is shown in FIG. 5, and will be discussed in more detail later. In the preferred embodiment, the key manager device driver is installed by including the name of the key manager device driver on the "DRIVERS=" line on the Windows internal file SYSTEM.INI. After block 120 is executed, the program ends in block 199. Note that FIG. 4 is only executed once each time the operating system is started.

FIG. 5 shows a flowchart of the operation of the key manager of the preferred embodiment of the invention. Block 210 monitors the operating system for any keystrokes received from the user. In the preferred embodiment, this is done by hooking the Windows Keyboard Message Queue, looking for messages indicating a keystroke was received.

When the Keyboard Message Queue indicates that a keystroke was received, block 230 asks if the keystroke received was in the key group. For purposes of this invention, a "key group" is a group of graphically displayed icons representing objects (e.g. data, application programs) associated with keystrokes. An exemplary key group is shown in FIG. 6. The key group shown in FIG. 6 contains four icons: an icon associated with the application program LLRemote, an icon associated with the application program File Manager, an icon associated with the MS Word for Windows data file "MYREPORT.DOC", and an icon associated with the application program MS Excel. The key group shown in FIG. 6 can be built or modified by the user by copying an icon contained in another program group or folder via a well known "drag and drop" or similar operation.

In the preferred embodiment, referring again to FIG. 5, block 230 looks for scancodes mapped to the Fn+F1 to Fn+F12 key combinations (e.g. hex 70 to hex 7B scancodes). If the keystroke received was not an Fn+Fx keystroke (where Fx is a function key from F1 . . . F12), block 230 is answered negatively, and flow returns to block 210. If the keystroke received was a Fn+Fx keystroke, block 230 is answered affirmatively. Block 240 then intercepts the keystroke from the operating system.

Block 242 interrogates the operating system for the contents of the key group. In the preferred embodiment, this is done via a well known Windows Dynamic Data Exchange call. An ordered key array containing objects associated with keystrokes is received in block 245. In the preferred embodiment, an array of command lines contains the path and filename necessary to execute objects (data and/or application programs) is returned by the operating system. The order of the objects in the key array returned from the operating system corresponds to the order of the icons in the key group, as determined by the operating system. In the exemplary key group of FIG. 6, the icons are ordered from left to right. Therefore, the command line necessary to execute the LLRemote application program is returned as the first position in the key array, with the command lines for the File Manager application program, the MS Word for Windows data file "MYREPORT.DOC", and the Excel application program following sequentially in the key array. This key array is shown in FIG. 7.

Referring again to FIG. 5, block 250 retrieves the associated object from the key array. In the preferred embodiment, the Fn+F1 keystroke is associated with the first position in the key array, Fn+F2 with the second position in the key array, and so on, with keystroke Fn+F12 being associated with the twelfth position in the key array. For example, if the keystroke received is an Fn+F3 keystroke, line 93 of key array 90 (FIG. 7), the command line for the MS Word for Windows data file "MYREPORT.DOC" is retrieved in block 250. Those skilled in the art will appreciate that keystrokes other than those specified above can be associated with the key array, with the size of the key array varying accordingly, and still fall within the spirit and scope of the invention.

Block 260 checks to see if the object has already been executed or invoked. In the preferred embodiment, this is done by using a callback function to enumerate all tasks currently running in the Windows operating system environment. If the object has already been executed or invoked (e.g. MS Word for Windows has been started and is displaying the data file "MYREPORT.DOC" in a non-active window on the display, or as a minimized icon), block 270 makes the object active, and flow returns back to block 210. If block 260 determines that the object has not already been executed or invoked, block 280 executes or invokes the object. For example, if the MS Word for Windows data file "MYREPORT.DOC" has not been started and the user presses the Fn+F3 key sequence, block 280 would start MS Word for Windows and display "MYREPORT.DOC" in the active window. Flow then returns back to block 210. Block 210 continues to monitor the operating system for keystrokes until the operating system is shut down.

Smouse, Evan P., York, Dennis C.

Patent Priority Assignee Title
10126906, Nov 23 2010 KYNDRYL, INC Optimizing a user interface for a computing device
10235006, Nov 23 2010 KYNDRYL, INC Optimizing a user interface for a computing device
5721850, Jan 15 1993 Thomson Reuters Global Resources Unlimited Company Method and means for navigating user interfaces which support a plurality of executing applications
5872995, Jul 26 1995 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P System for causing system management interrupt to execute second program before use of a scancode by first program if said scancode comprises a hotkey
5973688, Oct 31 1997 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Computing system having delayed keyboard shortcut hints
6069628, Jan 15 1993 Thomson Reuters Global Resources Unlimited Company Method and means for navigating user interfaces which support a plurality of executing applications
6078323, Apr 09 1998 International Business Machines Corporation Method and system for rapidly accessing graphically displayed toolbar icons via toolbar accelerators
6199125, May 26 1998 Bentley Systems, Incorporated Input manager for a computer application with display icons mapped to a user selectable set of standard keyboard keys
6529219, Oct 16 1998 Samsung Electronics Co., Ltd.; SAMSUNG ELECTRONICS CO , LTD , A CORP UNDER THE LAWS OF THE REPUBLIC OF KOREA Computer user interface for executing and controlling an application program using program selection smarts buttons
6909423, Aug 09 2002 Ortek Technology, Inc. Method for inputting commands in a keypad
7111243, Mar 02 2001 Oracle International Corporation Customization of tab-order functionality in internet applications
7216298, Jun 07 2001 Oracle International Corporation System and method for automatic generation of HTML based interfaces including alternative layout modes
7243309, Dec 03 2002 TAHOE RESEARCH, LTD Interface accelerator
7263662, Mar 02 2001 Oracle International Corporation Customization of immediate access and hotkey functionality in an internet application user interface
7263663, Mar 02 2001 Oracle International Corporation Customization of user interface presentation in an internet application user interface
7290220, Apr 03 2003 International Business Machines Corporation Method and apparatus for non-sequential access of form fields
7379965, Mar 02 2001 Oracle International Corporation System and method for searching data partially displayed on a user interface
7486276, Oct 03 2002 Panasonic Intellectual Property Corporation of America Key event controlling apparatus
7503009, Dec 29 2005 SAP SE Multifunctional icon in icon-driven computer system
7555723, May 04 1999 British Telecommunications public limited company GUI for selective copying of data
7603657, Mar 02 2001 Oracle International Corporation Customization of client-server interaction in an internet application
7661074, Jul 01 2005 Microsoft Technology Licensing, LLC Keyboard accelerator
7757185, Jan 06 2006 Apple Inc Enabling and disabling hotkeys
9092137, Mar 02 2001 Oracle International Corporation Customization of client-server interaction in an internet application
9632699, Feb 22 2012 User-configurable calculator
9651926, May 20 2011 ABB Schweiz AG System, method, work station and computer program product for controlling an industrial process
Patent Priority Assignee Title
5181029, May 13 1991 SAMSUNG ELECTRONICS CO , LTD Electronic keyboard template
5220675, Jan 08 1990 Microsoft Technology Licensing, LLC Method and system for customizing a user interface in an integrated environment
5287514, Jan 08 1990 Microsoft Technology Licensing, LLC Method and system for customizing a user interface in a computer system
/////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Feb 28 1994Hewlett-Packard Company(assignment on the face of the patent)
Feb 28 1994SMOUSE, EVAN P Hewlett-Packard CompanyASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0071170550 pdf
Apr 13 1994YORK, DENNIS C Hewlett-Packard CompanyASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0071170550 pdf
May 20 1998Hewlett-Packard CompanyHewlett-Packard CompanyMERGER SEE DOCUMENT FOR DETAILS 0115230469 pdf
Jan 31 2003Hewlett-Packard CompanyHEWLETT-PACKARD DEVELOPMENT COMPANY, L P ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0269450699 pdf
Date Maintenance Fee Events
Jul 07 1999ASPN: Payor Number Assigned.
Dec 10 1999M183: Payment of Maintenance Fee, 4th Year, Large Entity.
Dec 11 2003M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Dec 11 2007M1553: Payment of Maintenance Fee, 12th Year, Large Entity.
Dec 17 2007REM: Maintenance Fee Reminder Mailed.


Date Maintenance Schedule
Jun 11 19994 years fee payment window open
Dec 11 19996 months grace period start (w surcharge)
Jun 11 2000patent expiry (for year 4)
Jun 11 20022 years to revive unintentionally abandoned end. (for year 4)
Jun 11 20038 years fee payment window open
Dec 11 20036 months grace period start (w surcharge)
Jun 11 2004patent expiry (for year 8)
Jun 11 20062 years to revive unintentionally abandoned end. (for year 8)
Jun 11 200712 years fee payment window open
Dec 11 20076 months grace period start (w surcharge)
Jun 11 2008patent expiry (for year 12)
Jun 11 20102 years to revive unintentionally abandoned end. (for year 12)